{"id":"CVE-2023-45233","details":"EDK2's Network Package is susceptible to an infinite lop vulnerability when parsing a PadN option in the Destination Options header of IPv6. This\n vulnerability can be exploited by an attacker to gain unauthorized \naccess and potentially lead to a loss of Availability.","modified":"2026-04-02T09:25:31.289269Z","published":"2024-01-16T16:15:12.277Z","related":["ALSA-2024:2264","ALSA-2024:3017","GHSA-hc6x-cw6p-gj7h","SUSE-SU-2025:0407-1","SUSE-SU-2025:0421-1","SUSE-SU-2025:0503-1","SUSE-SU-2025:0752-1","SUSE-SU-2026:0196-1"],"references":[{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SJ42V7O7F4OU6R7QSQQECLB6LDHKZIMQ/"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/06/msg00007.html"},{"type":"WEB","url":"https://www.kb.cert.org/vuls/id/132380"},{"type":"ADVISORY","url":"http://packetstormsecurity.com/files/176574/PixieFail-Proof-Of-Concepts.html"},{"type":"ADVISORY","url":"https://github.com/tianocore/edk2/security/advisories/GHSA-hc6x-cw6p-gj7h"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20240307-0011/"},{"type":"ARTICLE","url":"http://www.openwall.com/lists/oss-security/2024/01/16/2"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/tianocore/edk2","events":[{"introduced":"0"},{"last_affected":"8736b8fdca85e02933cdb0a13309de14c9799ece"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"202311"}]}}],"versions":["edk2-stable201808","edk2-stable201811","edk2-stable201903","edk2-stable201905","edk2-stable201908","edk2-stable201911","edk2-stable202002","edk2-stable202005","edk2-stable202008","edk2-stable202011","edk2-stable202102","edk2-stable202105","edk2-stable202108","edk2-stable202108-rc0","edk2-stable202108-rc1","edk2-stable202111","edk2-stable202111-rc1","edk2-stable202202","edk2-stable202202-rc1","edk2-stable202205","edk2-stable202205-rc1","edk2-stable202208","edk2-stable202211","edk2-stable202302","edk2-stable202305","edk2-stable202308","edk2-stable202311","vUDK2017","vUDK2018"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-45233.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}